Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Don't force ig image change on cluster upgrade if it is custom. #3232

Conversation

KashifSaadat
Copy link
Contributor

Fixes #3160

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Aug 18, 2017
@k8s-ci-robot
Copy link
Contributor

Hi @KashifSaadat. Thanks for your PR.

I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here.

@k8s-ci-robot k8s-ci-robot added the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Aug 18, 2017
@KashifSaadat
Copy link
Contributor Author

/assign @chrislovecnm

@justinsb
Copy link
Member

/ok-to-test

This seems like a good change. Do you think we could glog.Warningf or fmt.Printf a message about why we're not updating the image though? Otherwise I worry people will get confused / lulled into a false sense of security.

In general I think we need to figure out how to do upgrades for people using different images... which image type are you using, out of interest?

@k8s-ci-robot k8s-ci-robot removed the needs-ok-to-test Indicates a PR that requires an org member to verify it is safe to test. label Aug 18, 2017
@KashifSaadat
Copy link
Contributor Author

Yeah of course, more logging is always good! :) I'll add this in.
We use CoreOS in our deployments, keeping on the stable channel.

(@gambol99 FYI)

@KashifSaadat KashifSaadat force-pushed the cluster-upgrade-persist-custom-image branch from b728517 to 7654f86 Compare August 18, 2017 10:09
@KashifSaadat
Copy link
Contributor Author

KashifSaadat commented Aug 18, 2017

I logged it as an info. Do you think it should specifically be a warning, in case of potential compatibility issues with an unsupported image?

})
}
} else {
glog.Infof("Custom image (%s) has been provided for Instance Group %q; not prompting for image upgrade", ig.Spec.Image, ig.GetName())
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit pick on the message, and it should be a Infof, as user is not doing something odd.

not prompting

Is kops rather not updating the image automatically since the user is not using the kope.io image? You have it as not prompting, which to me says CLI interaction.

Like I mentioned nit pick on english, and I am happy to get this in either way.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good spot, I'll just correct that now! 👍

@KashifSaadat KashifSaadat force-pushed the cluster-upgrade-persist-custom-image branch from 7654f86 to 6a3df8f Compare August 18, 2017 19:52
@chrislovecnm
Copy link
Contributor

/lgtm
/ok-to-test
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Aug 18, 2017
@k8s-github-robot
Copy link

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: KashifSaadat, chrislovecnm

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these OWNERS Files:

You can indicate your approval by writing /approve in a comment
You can cancel your approval by writing /approve cancel in a comment

@k8s-github-robot k8s-github-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Aug 18, 2017
@k8s-github-robot
Copy link

/test all [submit-queue is verifying that this PR is safe to merge]

@k8s-github-robot
Copy link

Automatic merge from submit-queue

@k8s-github-robot k8s-github-robot merged commit e3f27a6 into kubernetes:master Aug 18, 2017
@dcowden
Copy link

dcowden commented Aug 18, 2017

@justinsb we are using a centos baseline, which includes all of our standard monitoring, ids, change detection, and security baseline changes. We build our baselines weekly, so in our case we have additionally had to automate finding the latest approved Ami and editing the cluster to use it. Since kops edit is manual, we worked around it by manipulating the specs in the s3 bucket manually

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

6 participants